| The sorcerer's apprentice guide to fault attacks H Bar-El, H Choukri, D Naccache, M Tunstall, C Whelan Proceedings of the IEEE 94 (2), 370-382, 2006 | 1279 | 2006 |
| Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface PK Agarwal, T Akutsu, A Amihood, A Apostolico, C Benham, G Benson, ... Lecture notes in computer science (including subseries lecture notes in …, 2005 | 525* | 2005 |
| Differential fault analysis of the advanced encryption standard using a single fault M Tunstall, D Mukhopadhyay, S Ali IFIP international workshop on information security theory and practices …, 2011 | 476 | 2011 |
| Key extraction from the primary side of a switched-mode power supply S Saab, A Leiserson, M Tunstall 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-7, 2016 | 270 | 2016 |
| Fault analysis in cryptography M Joye, M Tunstall Springer, 2012 | 268 | 2012 |
| SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip J Longo, E De Mulder, D Page, M Tunstall International Workshop on Cryptographic Hardware and Embedded Systems, 620-640, 2015 | 218 | 2015 |
| Round reduction using faults H Choukri, M Tunstall FDTC 5, 13-24, 2005 | 143 | 2005 |
| Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output B Gierlichs, JM Schmidt, M Tunstall International conference on cryptology and information security in Latin …, 2012 | 130 | 2012 |
| Experimenting with Faults, Lattices and the DSA D Naccache, P Nguyên, M Tunstall, C Whelan Public Key Cryptography-PKC 2005, 16-28, 2005 | 118 | 2005 |
| Compiler Assisted Masking A Moss, E Oswald, D Page, M Tunstall Cryptographic Hardware and Embedded Systems–CHES 2012, 58-75, 2012 | 114 | 2012 |
| Exponent recoding and regular exponentiation algorithms M Joye, M Tunstall International Conference on Cryptology in Africa, 334-349, 2009 | 94 | 2009 |
| Differential power analysis of HMAC based on SHA-2, and countermeasures R McEvoy, M Tunstall, CC Murphy, WP Marnane International Workshop on Information Security Applications, 317-332, 2007 | 94 | 2007 |
| Side-channel analysis of cryptographic software via early-terminating multiplications J Großschädl, E Oswald, D Page, M Tunstall International Conference on Information Security and Cryptology, 176-192, 2009 | 92 | 2009 |
| Online template attacks L Batina, Ł Chmielewski, L Papachristodoulou, P Schwabe, M Tunstall Journal of Cryptographic Engineering 9 (1), 21-36, 2019 | 89 | 2019 |
| Attacking smart card systems: Theory and practice K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes information security technical report 14 (2), 46-56, 2009 | 84 | 2009 |
| Differential fault analysis of AES: towards reaching its limits SS Ali, D Mukhopadhyay, M Tunstall Journal of Cryptographic Engineering 3 (2), 73-97, 2013 | 76 | 2013 |
| Efficient use of random delays in embedded software M Tunstall, O Benoit IFIP International Workshop on Information Security Theory and Practices, 27-38, 2007 | 76 | 2007 |
| Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems R Avanzi, S Hoerder, D Page, M Tunstall Journal of Cryptographic Engineering 1 (4), 271-281, 2011 | 72 | 2011 |
| Fault analysis of DPA-resistant algorithms F Amiel, C Clavier, M Tunstall International Workshop on Fault Diagnosis and Tolerance in Cryptography, 223-236, 2006 | 68 | 2006 |
| Exploiting collisions in addition chain-based exponentiation algorithms using a single trace N Hanley, HS Kim, M Tunstall Cryptographers’ Track at the RSA Conference, 431-448, 2015 | 66 | 2015 |